跳到主要內容

臺灣博碩士論文加值系統

(100.28.2.72) 您好!臺灣時間:2024/06/13 13:42
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳郁文
研究生(外文):Yu-Wen Chen
論文名稱:運用資料隱藏技術於文件完整性驗證之研究
論文名稱(外文):The Research of Applying Data Hiding and Document Integrity Verification
指導教授:林祝興林祝興引用關係
指導教授(外文):Chu-Hsing Lin
學位類別:碩士
校院名稱:東海大學
系所名稱:資訊工程與科學系碩士在職專班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:35
中文關鍵詞:文件完整性二元圖檔資料隱藏
外文關鍵詞:Document integrityBinary imageData hiding
相關次數:
  • 被引用被引用:0
  • 點閱點閱:149
  • 評分評分:
  • 下載下載:37
  • 收藏至我的研究室書目清單書目收藏:2
在現代的生活之中,網際網路已經非常發達,也間接的改變人們的生活習慣,早年以書報等紙張書信等溝通訊息方式,早已經被電子訊號所取代,在電話、電報、網路盛行的時代裏,為了珍習地球資源,許多公司團體推行無紙化運動,但是紙張的使用卻無減少的趨勢。在紙張文件中,我們可以依據紙件的文字及紙張的狀態,來判別文件是否被更動,而在電子文件的時代,電子檔的改變是肉眼難以判別,若是電子文件無法改進此缺點,將無法進一步擴大電子文件的使用,則紙張的使用將無法減少。

在現今許許多多的媒体之中,二元文件在嵌入隱藏資料特別困難,二元文件的資料量,遠低於影片、音樂、及彩色圖片,且相對於這些擁有較大資料量媒体的研究,二元文件的研究卻是偏少。但在日常生活之中,二元文件卻是隨處可見,所以如何在二元文件上,嵌入隱藏資訊,以証明文件的完整性、和保証文件的智慧財產權等相關研究課題,在現今社會裏就顯得更為重要。

在此論文裏,我們提出一個方法,運用資料隱藏的技術,並提出適用於二元文件圖檔的完整性驗証方法,來驗証文件是否被竄改。我們針對文件中的黑色像素,取出其骨架像素,反之,針對白色像素,也取出其骨架,用來產生文件的驗証碼,並讓可以嵌入修改的像素,僅落於黑白交界之處,用於嵌入隱藏資料之用,並實驗証明所提出方法的可行性。
The internet network is very popular in the modern society. It changes the habits and behaviors of people. Now we can easily exchange and transmit message through telegram, computer network, wireless network and telephone network…, etc. and many organizations and companies pursue paperless processing to save the time, resources and money. Although the electronic document is very popular, the tendency of paper using is not decline. In traditional document, we normally confirm the document authenticity by observing some symptoms of the paper. Unfortunately, the electronic document can’t easily achieve the goal. Because it can easily be spread and modified perfectly, the integrality of electronic document and guarantee its intelligence proprietary can’t be easily authenticated.

In this thesis, we propose an approach by using data hiding technique for authenticating the integrality of electronic document. We use the characteristic value of binary image to produce a message authentication code (MAC), then use it to produce a data hiding message for being embedded in boundary between white and black pixels.
第壹章 序論............................................................................................................1
第一節 研究動機............................................................................................1
第二節 論文架構............................................................................................2
第貳章 研究背景....................................................................................................3
第一節 資訊隱藏............................................................................................3
第二節 資訊隱藏分類....................................................................................4
第參章 相關研究....................................................................................................7
第一節 二元文件圖檔....................................................................................7
第二節 最佳嵌入點的撰擇技術....................................................................7
第二節完整性驗証技術..................................................................................9
第肆章 運用資料隱藏技術於文件完整性驗證..................................................14
第一節 新文件完整性驗證方法..................................................................14
第二節 嵌入流程..........................................................................................17
第三節 驗證流程..........................................................................................23
第伍章 實驗..........................................................................................................25
第一節 實驗架構..........................................................................................25
第二節 實驗成果..........................................................................................25
第陸章 結論..........................................................................................................32
第柒章 參考文獻..................................................................................................33
1.Neil F. Johnson, Sushil Jajodia, “Exploring Steganography : Seeing the Unseen,” IEEE Computer, Vol. 31, No. 2, Feb. 1998, pp.26-34.
2.B. Pfitzmann, “Information Hiding Terminology, ” Proceedings of the first workshop on Information Hiding,” Lecture Notes in Computer Science, Springer-Verlag, Berlin, Cambridge, UK, pp.347-350.
3.F. A. P. Petitcolas, R J. Anderson, M. G. Kuhn, “Information Hiding –A Survey,” Proceedings of the IEEE, Vol.87, No.7, July 1999., pp.1062-1078.
4.Haiping Lu, Jian Wang, A.C. Kot, Y.Q. Shi, “An objective distortion measure for binary document images based on human visual perception,” Pattern Recognition, 2002. Proceedings. 16th International Conference on
Vol 4, 2002 ,pp.239-242.
5.A.T.S. Ho, N.B. Puhan, P. Marziliano, A. Makur; Y.L. Guan, “Perception based binary image watermarking,” Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on Vol 2, 23-26 May 2004 , pp.37-40.
6.Huijuan Yang, Alex C. Kot, “Data Hiding For Text Document Image Authentication By Connectivity-Preserving,” IEEE International Conference on Vol. 2, March 18-23, 2005, pp.505-508.
7.Haiping Lu, A. C. Kot, Jun Cheng, “Secure Data Hiding in Binary Document Images for Authentication,” ISCAS '03. Proceedings of the 2003 International Symposium on Vol. 3, May 2003, pp.806-809.
8.Y. C. Tseng, H. K. Pan, “Data Hiding in 2-Color Images,”IEEE Transactions on Computers, Vol. 51, No.7, Jul. 2002, pp.873-878.
9.M. Wu, E. Tang and B. Liu, “Data Hiding in Digital Binary Image,”IEEE International Conference on Multimedia and Expo., 2000, pp. 393-396.
10.P. W. Wong, N.D. Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,”IEEE Transaction on Image Processing, Vol. 10, No. 10, Oct. 2001, pp.1593-1601.
11.N. Steffensen, N. Bourbakis, “A method for parallel skeletonization of images,”International Conference on Vol. 2, Oct. 1995, pp.109-112.
12.Haiping Lu, A. C. Kot, Jun Cheng, “Secure Data Hiding in Binary Document Images for Authentication,” ISCAS '03. Proceedings of the 2003 International Symposium on Vol. 3, May 2003, pp.806-809.
13.M. Wu, E. Tang, B. Liu, “Data Hiding in Digital Binary Image,”IEEE International Conference on Multimedia and Expo., 2000, pp.393-396.
14.P. W. Wong, N.D. Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,”IEEE Transaction on Image Processing, Vol. 10, No. 10,Oct. 2001, pp.1593-1601.
15.S. D. Lin, C. F. Chen, “A Robust Dct-based Watermarking for Copyright Protection,” IEEE Transaction on Consumer Electronics, Vol. 46, No. 3, August 2000, pp.415-421.
16.Lee, J., and Won, C. S., “A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Correction,” IEEE Transactions on Consumer Electronics, vol. 46, no. 2, 2000, pp.313-317.
17.Reiner Eschbach, “Recent Progress in Digital Halftoning”, Recent Progress in Digital Halftoning II, Reprinted from IS&T Proceedings, 1999, pp.9-11.
18.C. F. Wu, W. S. Hsieh, “Digital watermarking Using Zerotree of DCT” IEEE Transactions on Consumer Electronics, Vol. 46, No.1, Feb. 2000, pp.87-94.
19.H. Inoue, A. Miyazaki, A. Yamamoto, “A digital watermarking based on the wavelet transform and its robustness on image compression,” Proceeding of IEEE international conference on Image Processing, Vol. 2, 1998, pp.391-395.
20.H. Inoue, A. Miyazaki, T. Katsura, “Wavelet based watermarking for tampering proofing of still images,” IEEE Int. Conf. on Image Processing, Vol. 2, Sep. 2000, pp.88-91.
21.M. Kutter, S. Winkler, “A vision-based masking model for spread-spectrum image.” Image Processing, IEEE Transactions on Jan, 2002, pp.16-25.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top